Bug 449742 (CVE-2007-5375) - CVE-2007-5375 Java Multi-pin DNS rebinding allows arbitrary Javascript Execution
Summary: CVE-2007-5375 Java Multi-pin DNS rebinding allows arbitrary Javascript Execution
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2007-5375
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://crypto.stanford.edu/dns/dns-re...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-06-03 10:11 UTC by Marc Schoenefeld
Modified: 2022-04-20 12:53 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-12-23 15:34:17 UTC
Embargoed:


Attachments (Terms of Use)

Description Marc Schoenefeld 2008-06-03 10:11:25 UTC
Interpretation conflict in the Sun Java Virtual Machine (JVM) allows
user-assisted remote attackers to conduct a multi-pin DNS rebinding attack and
execute arbitrary JavaScript in an intranet context, when an intranet web server
has an HTML document that references a "mayscript=true" Java applet through a
local relative URI, which may be associated with different IP addresses by the
browser and the JVM.

Comment 1 Marc Schoenefeld 2010-12-23 09:51:06 UTC
This is from http://crypto.stanford.edu/dns/dns-rebinding.pdf, the two other bugs from this paper that were also identified alongside this bug were CVE-2007-5273 and CVE-2007-5274. 

We queried Sun in June 2008 whether this is a duplicate of CVE-2007-5273 or CVE-2007-5274 . But we never received an answer, and Sun never acknowledged this to be an genuine Java bug. 

Given the age, the low impact, and the fact that the bug doesn't affect our shipped java versions (java-1.5.0-sun deprecated), I would opt to close this.


Note You need to log in before you can comment on or make changes to this bug.